Security in Cloud-Native Services: A Survey
Cloud-native services face unique cybersecurity challenges due to their distributed
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …
GRACE: Empowering LLM-based software vulnerability detection with graph structure and in-context learning
Software vulnerabilities inflict considerable economic and societal harm. Therefore, timely
and accurate detection of these flaws has become vital. Large language models (LLMs) …
and accurate detection of these flaws has become vital. Large language models (LLMs) …
PatchFinder: A two-phase approach to security patch tracing for disclosed vulnerabilities in open-source software
Open-source software (OSS) vulnerabilities are increasingly prevalent, emphasizing the
importance of security patches. However, in widely used security platforms like NVD, a …
importance of security patches. However, in widely used security platforms like NVD, a …
Mitigating persistence of open-source vulnerabilities in maven ecosystem
Vulnerabilities from third-party libraries (TPLs) have been unveiled to threaten the Maven
ecosystem in the long term. Despite patches being released promptly after vulnerabilities …
ecosystem in the long term. Despite patches being released promptly after vulnerabilities …
Does the Vulnerability Threaten Our Projects? Automated Vulnerable API Detection for Third-Party Libraries
Developers usually use third-party libraries (TPLs) to facilitate the development of their
projects to avoid reinventing the wheels, however, the vulnerable TPLs indeed cause severe …
projects to avoid reinventing the wheels, however, the vulnerable TPLs indeed cause severe …
Empirical Analysis of Vulnerabilities Life Cycle in Golang Ecosystem
Open-source software (OSS) greatly facilitates program development for developers.
However, the high number of vulnerabilities in open-source software is a major concern …
However, the high number of vulnerabilities in open-source software is a major concern …
Enhancing Security through Modularization: A Counterfactual Analysis of Vulnerability Propagation and Detection Precision
In today's software development landscape, the use of third-party libraries is near-
ubiquitous; leveraging third-party libraries can significantly accelerate development …
ubiquitous; leveraging third-party libraries can significantly accelerate development …
Adversarial Analysis of Software Composition Analysis Tools
E Ivanova, N Stakhanova, B Sistany - International Conference on …, 2024 - Springer
With the widespread use of third-party code in software projects, Software Composition
Analysis (SCA) tools emerged in order to help developers and security specialists automate …
Analysis (SCA) tools emerged in order to help developers and security specialists automate …
The Software Genome Project: Venture to the Genomic Pathways of Open Source Software and Its Applications
With the boom in modern software development, open-source software has become an
integral part of various industries, driving progress in computer science. However, the …
integral part of various industries, driving progress in computer science. However, the …
Vulnerability Root Cause Function Locating For Java Vulnerabilities
L Zhang - Proceedings of the 2024 IEEE/ACM 46th International …, 2024 - dl.acm.org
Software Composition Analysis has emerged as an essential solution for mitigating
vulnerabilities within the dependencies of software projects. Reachability analysis has been …
vulnerabilities within the dependencies of software projects. Reachability analysis has been …